Analysis

  • max time kernel
    30s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2024 11:26

General

  • Target

    438fd1b4851a7e5f197213bc395b959b.exe

  • Size

    672KB

  • MD5

    438fd1b4851a7e5f197213bc395b959b

  • SHA1

    a7bf66d2a7b448cc17e9417b9dadb1ac939207d8

  • SHA256

    e3e8000633c5f872efa0cd4655259990d051576699067b8e481bcf8181976685

  • SHA512

    b65de990561d7e9c400dc016fb3395341854322ff1dd68e0187161f7ea8236002f62c9d749bbcd7aaee811f4c30f4186f21496d70d01fded4b844e43e8e46974

  • SSDEEP

    12288:xeBNUbTVO86UCHruRdp+WA00SKCpVRwfsXSVUhbxk9e/pJu:xJIUCNd0nKwYkX+UhbW9eM

Malware Config

Signatures

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\438fd1b4851a7e5f197213bc395b959b.exe
    "C:\Users\Admin\AppData\Local\Temp\438fd1b4851a7e5f197213bc395b959b.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2120
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:2148
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Executes dropped EXE
    PID:4912
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:2320
    • C:\Windows\system32\fxssvc.exe
      C:\Windows\system32\fxssvc.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:3500
    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:3920
    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:4712
    • C:\Windows\system32\SearchIndexer.exe
      C:\Windows\system32\SearchIndexer.exe /Embedding
      1⤵
        PID:4312
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
            PID:3648
          • C:\Windows\system32\SearchFilterHost.exe
            "C:\Windows\system32\SearchFilterHost.exe" 0 804 808 816 8192 812 788
            2⤵
              PID:2792

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

            Filesize

            8KB

            MD5

            9376c99a450419f6fe21222fa643de02

            SHA1

            de04f0abeab3a4fc832f7a42a2f0c559d4c514f6

            SHA256

            b709eadb1d3dba1845bc81410c2a63f2e0421f5cff4888285a8544d558f358de

            SHA512

            1a9728a5cc8e31af0a00263ad56eed27e8a3ba1fb27b5e613f7a084b3a6b16055e6d397cd42efd5124ffdf4e92a82ad83caeb7bb3abdf825fb93d7fc8c0e0ee6

          • C:\Program Files\7-Zip\7z.exe

            Filesize

            28KB

            MD5

            da33892ac6cd8f2991e11d01dc40700b

            SHA1

            196160de170c3ba1991457f8e2921c6c529f4f89

            SHA256

            9d12a19e604f0782245eb21351a332b4e6b71a31d6714e807b914b8b0f181ed1

            SHA512

            cb014c7a46095b9228bc1d034b5f2b36852efa0d9ecbe3a1cd8b7a32e21d747a149f4b5891161e28178b934f842c56a812869524e1fa7c61b788d219e0dbca0d

          • C:\Program Files\7-Zip\7zFM.exe

            Filesize

            55KB

            MD5

            0ea9388406b78296b6dafbc5a3d9c583

            SHA1

            2b3b556c75274911b892e56e188d53fd01aa1cd2

            SHA256

            11b81d2ab8de1b5ea476d3efe8fc27eea48024472f8f50821dd9104584ebfe8a

            SHA512

            2146e0a21ee6b2fb243e4ea82b8628accd99e5efbc84446d80b0b30f7b3131d3f7fb0d2c59977842d78aab38dd73df7312cf77d50c120b316540e936cfde46ee

          • C:\Program Files\7-Zip\7zG.exe

            Filesize

            77KB

            MD5

            9cf5886cdf77958783f915e0c34a2d61

            SHA1

            e49b8fe3757d02ba784b3bfee958132065865826

            SHA256

            1b8b8b5ad2fbb461ddc8c9c7dbdbad8aeaa0ce45e38ddd92c2ce11edea98b478

            SHA512

            34372a017a0a370a733bbb071d767b64a6fd6e387021daa01d5ce56ae89210c05973b6299db0870e1a41c7b973eb5b1b7d44ef5a9a6372a60bb8b4cfb79e0641

          • C:\Program Files\7-Zip\Uninstall.exe

            Filesize

            4KB

            MD5

            bb64b229805fc23c928062e43d505e46

            SHA1

            16a7ba66e2cc519e395c8f4b4a950f99fdf36e25

            SHA256

            c9d213c4fb5d9306c795103cefdb14aee64dfae856634bff14f86d8ab9529363

            SHA512

            0a5f69a3dbfca5dfa52f6d930dbd927454ee846096cc1eab0a95daace91147f9b8512be73211cdda6c4d6c82eac435efcc250d00ce76f5427a2d7b7d1d16ea16

          • C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe

            Filesize

            10KB

            MD5

            9c268686a7d7747d2d7151f2e8ba86dc

            SHA1

            eb3c5ef25a82ebd1c401b69fada9f64a81c828cd

            SHA256

            57435342c39f94ea4be8f7a8858ec2452cec38d07e25377d960835466e701404

            SHA512

            125e38a90654e9d7bbd49a2eaee57008bda72a3736a3bb6df737e72bc357fb6b2efc2a1ef511f384f36b5cdc2ee56a64bdc40ee8a7bbcda4b3ea6defb1a15e46

          • C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe

            Filesize

            13KB

            MD5

            72739a671b38a1415a34b01e889eef8c

            SHA1

            659c882d6bc07ba7cfc17032aa45f6c844899fbb

            SHA256

            beec318a72725fb0368314323edd9ee5aee5ec1c5e1b05007ba256f6d9e56130

            SHA512

            cbe27b35b2ba74adbe9bff4623699fda9ddba81eb2a6d5b6b02118b3753b9fb77668d994d4a49c2808aa717b39da0ef2b8259917dfd5cf2370794f5dbcf8fb67

          • C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe

            Filesize

            7KB

            MD5

            b2028140fa4cbf503d66fbe10bd76f26

            SHA1

            3e503eaec4a668d203beebe2aca8459254b076a1

            SHA256

            d21c39e50f3b7fdc0b8e8ffb25d60355bddd327480a3a156850de5adcb94b0d0

            SHA512

            85a2f2cbf51542a858ec83166c2263fa8852d347f69df8ebc40255e5dfde37df4437838092365057738303da88e1de5494b81754524f47f0d8ec7b485b7b0e47

          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

            Filesize

            4KB

            MD5

            08db019c719be1a09c3940e1b24b7a34

            SHA1

            8e509ecafc07bf300e291113efeca2bf3005e283

            SHA256

            c57ad919a40c737865ea30c3eb40f354768b4297ff85af72b90ba19451ec3fdb

            SHA512

            c2dfff59ef2616bcc2df43d2dc0220851593458382769ff1e15387e17adc71324ed8883d5f5bbd0a924056eb42ee48ce0d2347bac6b47d70bbbc3284fa79ce38

          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

            Filesize

            49KB

            MD5

            d3b3a92c24e3116aa0d80c17cdecc751

            SHA1

            9f707a103bd75ca70c6f508e291bcf95bc98a926

            SHA256

            2a605ad87f8eddef033d715a88bcbe1c71bfec73afaba0b0093255bdc5dc9725

            SHA512

            8a0076681ab4b67da541fd5b4c6971ac97c5df723e3c272b5e7d7f30f06c9989ae1d156ff77e9fa916664e745656a184d78c47058a1f9fdd763b6a4809f5984d

          • C:\Users\Admin\AppData\Local\ilqcccpf\hhpgladp.tmp

            Filesize

            7KB

            MD5

            cfa3db2392727e17e3ce1949265f8b75

            SHA1

            ecefd4045a51a9b74c0d41b553dd9501df57edb0

            SHA256

            8630e5f3b6027c60bdae79da13cc99ef01509bb629f3e4c80abcf238bcd4c0da

            SHA512

            9f015eb5f3f461f58e5638006f980a17bf7179b81f587bc66d19bae7901b3db4b8943a2828ad64e7b3d285fc2d37c7e77c08c6aef8e1108e89989381bcf48904

          • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

            Filesize

            25KB

            MD5

            f0416064e3b9acf1395bc055a3b35ebe

            SHA1

            b12e729e5f2e2e78f544c9f33be14baf11c6cf61

            SHA256

            b36328d83ea812fa0ff4f22396ab1d00c12d0c2be2e2c68a6b493637e05e61cf

            SHA512

            5776a9bb97054c2e9335c789ba08b58d9fb6d2fd0c6c829ea24f007a1664824cb00877cbc389ef117560bca2cf83f8c3d9ce1db7eeafa29755f4c785067b353c

          • C:\Windows\System32\FXSSVC.exe

            Filesize

            21KB

            MD5

            e04f3a812190a0c97f17b919a3d6c893

            SHA1

            0bdd522db31aa7cf71059b1f7935b5cc23fceae7

            SHA256

            b16457edc824db0ccf4a8e92dc6690912b9a5ccafbc8beeb4a05f413238343ae

            SHA512

            901c2b204424a4eb43f99164abcb0681e31038e0b370cef60b13eb1eb1117d3b803a2d2fb87567c48b0adb01e9ad059cf608a9d16ca52335755c89c3d4bef7c6

          • C:\Windows\System32\SearchIndexer.exe

            Filesize

            37KB

            MD5

            b1722f734c673eae83fd85da62cd1bb4

            SHA1

            667223a4965434476ffa77f3853bba5bef6c44cd

            SHA256

            aec15efc14a733ef94db18dae1de008a2e857f29b8c340aa79db90f86be14519

            SHA512

            b4f3ab57145168b716290498a8158dbc67f28ced324e45d0f52540c937a3e2e59d0d30868b055bff0468e186d81bdbcc7f23eb4f0d6aa40fd77d478d234d5eb4

          • C:\Windows\System32\alg.exe

            Filesize

            20KB

            MD5

            dd8ff47391db6972be6a572a46736fbd

            SHA1

            0023b1da3ebf63ab486ab614c668a52b4ebe06cb

            SHA256

            858919b8712d9959e3cde615ff6093e830aa052e8d538c24c3da562b354aa5c6

            SHA512

            9370b85a3e3cf047c1718d2a5eed2a9a1e4bcb104daf57f93ea8015b6bad0bbfa77bd071562073ac37ca7a22835b2548e31823c58a7ee78228a18c24e6a6d08f

          • C:\Windows\system32\windowspowershell\v1.0\powershell.exe

            Filesize

            839KB

            MD5

            c46061fd868c37fa817f904947d29dc4

            SHA1

            a901008a6ddf678091b22107744b361118bf9d37

            SHA256

            c06e0f8d918ade40598444dc129fa8e1102417559570f9abbab1bd1b4d360ea4

            SHA512

            93b4b5fe3620c6776c7b0e3c12a5a6b258977ec7333d84f78837f952ec5f5ae15506d5c65e1cc5f8e1c4754d42c5d23e63766483899e7f7ae587e32f6b41db9b

          • \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe

            Filesize

            21KB

            MD5

            ebad25d4b573e06b968923cc86997581

            SHA1

            d36be5b849b01dd3619ff16a2ab6c2b749b9d549

            SHA256

            a3b31246ac37fce753066f5fe03739eac0407648ffe36dbc3f1d9ed949f1ee6e

            SHA512

            d9b401e5f3a62cb596edffe7366c9cf525abd037aaa9d13416bf41b47c0ada88fdf7aca3584dffc75ab4e72a85fb6ce86c59057a311d6ba540c2a758d48569a5

          • memory/2120-2-0x00007FF629E20000-0x00007FF629F20000-memory.dmp

            Filesize

            1024KB

          • memory/2120-88-0x00007FF629E20000-0x00007FF629F20000-memory.dmp

            Filesize

            1024KB

          • memory/2120-0-0x00007FF629E20000-0x00007FF629F20000-memory.dmp

            Filesize

            1024KB

          • memory/2148-17-0x00007FF710860000-0x00007FF710933000-memory.dmp

            Filesize

            844KB

          • memory/2148-149-0x00007FF710860000-0x00007FF710933000-memory.dmp

            Filesize

            844KB

          • memory/2148-51-0x00007FF710860000-0x00007FF710933000-memory.dmp

            Filesize

            844KB

          • memory/2792-278-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-289-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-336-0x000001ADD9A00000-0x000001ADD9A10000-memory.dmp

            Filesize

            64KB

          • memory/2792-335-0x000001ADD9A00000-0x000001ADD9A10000-memory.dmp

            Filesize

            64KB

          • memory/2792-329-0x000001ADD99F0000-0x000001ADD9A00000-memory.dmp

            Filesize

            64KB

          • memory/2792-311-0x000001ADDA450000-0x000001ADDA6CE000-memory.dmp

            Filesize

            2.5MB

          • memory/2792-277-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-276-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-279-0x000001ADD99E0000-0x000001ADD99F0000-memory.dmp

            Filesize

            64KB

          • memory/2792-282-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-286-0x000001ADD99F0000-0x000001ADD9A00000-memory.dmp

            Filesize

            64KB

          • memory/2792-296-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-297-0x000001ADD9A00000-0x000001ADD9A10000-memory.dmp

            Filesize

            64KB

          • memory/2792-298-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-295-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-280-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-294-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-293-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-292-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-291-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-290-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-281-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-288-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-287-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-285-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-284-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/2792-283-0x000001ADD99D0000-0x000001ADD99E0000-memory.dmp

            Filesize

            64KB

          • memory/3500-36-0x00007FF6E1AE0000-0x00007FF6E1C3F000-memory.dmp

            Filesize

            1.4MB

          • memory/3500-37-0x00007FF6E1AE0000-0x00007FF6E1C3F000-memory.dmp

            Filesize

            1.4MB

          • memory/3920-44-0x00007FF607070000-0x00007FF6072D1000-memory.dmp

            Filesize

            2.4MB

          • memory/3920-181-0x00007FF607070000-0x00007FF6072D1000-memory.dmp

            Filesize

            2.4MB

          • memory/4312-251-0x00000203B6120000-0x00000203B6130000-memory.dmp

            Filesize

            64KB

          • memory/4312-310-0x00007FF7BF5F0000-0x00007FF7BF793000-memory.dmp

            Filesize

            1.6MB

          • memory/4312-235-0x00000203B5EF0000-0x00000203B5F00000-memory.dmp

            Filesize

            64KB

          • memory/4312-234-0x00007FF7BF5F0000-0x00007FF7BF793000-memory.dmp

            Filesize

            1.6MB

          • memory/4312-271-0x00000203BBD00000-0x00000203BBD08000-memory.dmp

            Filesize

            32KB

          • memory/4312-267-0x00000203BA4E0000-0x00000203BA4E8000-memory.dmp

            Filesize

            32KB

          • memory/4712-187-0x00007FF6F7E40000-0x00007FF6F8095000-memory.dmp

            Filesize

            2.3MB

          • memory/4712-53-0x00007FF6F7E40000-0x00007FF6F8095000-memory.dmp

            Filesize

            2.3MB

          • memory/4912-160-0x00007FF6CF730000-0x00007FF6CF802000-memory.dmp

            Filesize

            840KB

          • memory/4912-29-0x00007FF6CF730000-0x00007FF6CF802000-memory.dmp

            Filesize

            840KB